CVE-2026-25628

Source
https://cve.org/CVERecord?id=CVE-2026-25628
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25628.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25628
Aliases
Published
2026-02-06T20:44:13.487Z
Modified
2026-02-21T06:44:05.475088Z
Severity
  • 8.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Qdrant affected by arbitrary file write via `/logger` endpoint
Details

Qdrant is a vector similarity search engine and vector database. From 1.9.3 to before 1.16.0, it is possible to append to arbitrary files via /logger endpoint using an attacker-controlled ondisk.logfile path. Minimal privileges are required (read-only access). This vulnerability is fixed in 1.16.0.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-73"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25628.json"
}
References

Affected packages

Git / github.com/qdrant/qdrant

Affected ranges

Type
GIT
Repo
https://github.com/qdrant/qdrant
Events

Affected versions

v1.*
v1.10.0
v1.10.1
v1.11.0
v1.11.1
v1.11.2
v1.11.3
v1.11.4
v1.11.5
v1.12.0
v1.12.1
v1.12.2
v1.12.3
v1.12.4
v1.12.5
v1.12.6
v1.13.0
v1.13.1
v1.13.2
v1.13.3
v1.13.4
v1.13.5
v1.13.6
v1.14.0
v1.14.1
v1.15.0
v1.15.1
v1.15.2
v1.15.3
v1.15.4
v1.15.5
v1.9.3
v1.9.4
v1.9.5
v1.9.6
v1.9.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25628.json"